Computerworld Security: September 04, 2013
===============================================================
NSA-resistant Android application 'burns' sensitive messages
Silent Circle, a company specializing in encrypted communications, released a
messaging application for Android devices on Wednesday that encrypts and
securely erases messages and files.
http://cwonline.computerworld.com/t/8717827/823929835/628804/17/
~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: Prolexic Technologies~~~~~~~~~~~~~~~~~~~~~
Everything you need to know about SYN reflection attacks
SYN reflection attacks are used against targets that support TCP. If a
successful multi-step "handshake" cannot be completed between computers,
repeated attempts are made. SYN reflection attacks misdirect these handshakes,
flooding other machines with communication requests. Download the new white
paper to learn more about this new threat.
http://cwonline.computerworld.com/t/8717827/823929835/628805/18/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IN THIS ISSUE
1. Darlene Storm: Phone attack can hijack calls and block texts sent to everyone in a city
http://cwonline.computerworld.com/t/8717827/823929835/628806/19/
2. Researcher claims $12,500 reward for finding Facebook photo bug
http://cwonline.computerworld.com/t/8717827/823929835/628807/20/
3. Lookout security for Samsung Knox smartphones
http://cwonline.computerworld.com/t/8717827/823929835/628808/21/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Symantec~~~~~~~~~~~~~~~~~~~~~
Virtual Machine Backup and Recovery Five Critical Decisions
Because of the outstanding economy, flexibility, and service levels it offers,
virtualization is transforming data centers at breakneck speed: by 2016, an
estimated 80% of the world's x86 servers will be virtual machines (VMs). But the
speed of this transformation raise challenges for "traditional" IT services and
the teams that deliver them.
http://cwonline.computerworld.com/t/8717827/823929835/628809/28/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=81c22064
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Darlene Storm: Phone attack can hijack calls and block texts sent to everyone in a city
Security researchers hacked the firmware in Motorola phones to demonstrate new
GSM cellular network targeted attacks capable of hijacking calls or texts sent
to a specific victim. In "Let Me Answer That for You: Exploiting Broadcast
Information in Cellular Networks," they explained that if several phones
were modified, then the hacked phones could launch denial of service attacks
capable of blocking all calls and texts to a metropolitan area.
http://cwonline.computerworld.com/t/8717827/823929835/628806/29/
~~~~~~~~~~~~~~~~~~~WHITE PAPER: Symantec~~~~~~~~~~~~~~~~~~~~~
Evolution and Value of Purpose Build
This IDC White Paper explores the increased use and adoption patterns of PBBAs
and the utility these appliances provide to customers in their data protection
processes. In addition, this White Paper illuminates the customer value that
Symantec's Backup Exec and NetBackup appliances bring to the data protection and
recovery process.
http://cwonline.computerworld.com/t/8717827/823929835/628810/30/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=6118d709
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Researcher claims $12,500 reward for finding Facebook photo bug
A security researcher said Facebook will award him $12,500 for finding a flaw
that lets anyone remove photos from another person's profile.
http://cwonline.computerworld.com/t/8717827/823929835/628807/31/
Lookout security for Samsung Knox smartphones
Samsung Knox smartphones will include mobile security software from Lookout to
protect business users from mobile threats, the San Francisco company said
Tuesday.
http://cwonline.computerworld.com/t/8717827/823929835/628808/32/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
DIGITAL SPOTLIGHT: CLOUD COMPUTING
In our in-depth report on cloud computing, we take a closer look at
platform-as-a-service, security-as-a-service and back-end-as-a-service, weighing
the benefits and challenges of each service and sharing tips from early
adopters.
This free, 12-page magazine-style report is available now [Registration
required]
To read the report, click here:
http://cwonline.computerworld.com/t/8717827/823929835/615407/33/?3e076d18=am9uc2FuOThAZ21haWwuY29t&x=c06b2f1e
CALL FOR NOMINATIONS: PREMIER 100 IT LEADERS
Now's your chance to get a worthy CIO or other top IT executive nominated for
next year's Premier 100 IT Leaders awards! Deadline is Friday, Aug. 30.
To make a nomination, click here: http://cwonline.computerworld.com/t/8717827/823929835/616819/34/
KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile
hardware, mobile apps, enterprise apps and IT trends related to consumerization.
We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization
affects IT. Stay up to date with news, reviews and in-depth coverage.
Subscribe now:
http://cwonline.computerworld.com/t/8717827/823929835/604375/35/
JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking
news, features, blogs, tech reviews and career advice.
http://cwonline.computerworld.com/t/8717827/823929835/598565/36/
CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
Steve Ballmer will retire as CEO of Microsoft within the next 12 months, and a
U.K. bookmaker is taking wagers on his replacement. If you had to bet, who would
you pick to be the next Microsoft CEO?
http://cwonline.computerworld.com/t/8717827/823929835/628293/37/
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwonline.computerworld.com/t/8717827/823929835/156832/38/
Get more IT peer perspective online:
LinkedIn Group: http://cwonline.computerworld.com/t/8717827/823929835/311619/39/
Facebook: http://cwonline.computerworld.com/t/8717827/823929835/311620/40/
Twitter: http://cwonline.computerworld.com/t/8717827/823929835/311621/41/
===============================================================
CONTACTS/SUBSCRIPTIONS
You are currently subscribed to computerworld_security as: jonsan98@gmail.com.
To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/8717827/823929835/131135/42/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODIzOTI5ODM1LmZiMjM3OGMxMDdkZDhkNzE2Mzk0N2I5ZTU5NWE0Mjc5Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz04NzE3ODI3&x=fb695e08
To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/8717827/823929835/72510/43/
To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/8717827/823929835/231613/44/
Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/8717827/823929835/72509/45/
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Computerworld, please send an e-mail to online@computerworld.com.
Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **
Wednesday, September 4, 2013
NSA-resistant Android application 'burns' sensitive messages
Lainnya dari
Ditulis Oleh : Angelisa Vivian Hari: 6:00 AM Kategori:
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment